Binance Square

PhishingScam

246,074 views
104 Discussing
OS83
--
See original
šŸ” Crypto Security Crypto security is the protection of digital assets such as Bitcoin and Ethereum from theft and hacking. #Write2Earn 🧱 Key aspects: Digital wallets: Hot: Connected to the internet and easy to use but less secure. Cold: Not connected to the internet and more secure. Private keys: Very secret, allowing you access to your funds. Never share them. Two-factor authentication (2FA): An additional layer of security to confirm identity. āš ļø Common threats: Phishing. Platform hacks. Malware and key theft. Social engineering. āœ… Essential tips: Use cold wallets to store currencies. Enable two-factor authentication. Do not disclose your keys. Always check links and websites. #phishingscam #BNBATH $BNB $BTC $AVAX
šŸ” Crypto Security
Crypto security is the protection of digital assets such as Bitcoin and Ethereum from theft and hacking.
#Write2Earn

🧱 Key aspects:
Digital wallets:
Hot: Connected to the internet and easy to use but less secure.
Cold: Not connected to the internet and more secure.
Private keys: Very secret, allowing you access to your funds. Never share them.
Two-factor authentication (2FA): An additional layer of security to confirm identity.

āš ļø Common threats:
Phishing.
Platform hacks.
Malware and key theft.
Social engineering.

āœ… Essential tips:
Use cold wallets to store currencies.
Enable two-factor authentication.
Do not disclose your keys.
Always check links and websites.

#phishingscam #BNBATH $BNB $BTC $AVAX
🚨 A TERRIFYING TRAGEDY: TRADER LIQUIDATED BY HIS OWN WALLET 🚨 call or a failed trade. This is a chilling warning about the most overlooked threat in crypto. A high-volume intraday trader, a "pro" by all accounts, just lost his entire portfolio. The culprit? Not a market crash, but his own wallet choice. šŸ’€ Here's how it went down: he kept his entire portfolio in a hot wallet for quick transfers. Unbeknownst to him, he had clicked a single phishing link earlier. In a matter of seconds, hackers drained his entire balance. Months of profit, gone in a flash—not by the market, but by a simple mistake. The Hard Lessons You Must Learn šŸ“– Hot Wallets Are Not for Life Savings: They are fast and convenient because they are always online. This constant connectivity makes them a prime target for hackers. Use them for small, everyday transactions—your "pocket money." Never for your entire portfolio. Cold Wallets Are Your Vault: A cold wallet, or hardware wallet, is a physical device that stores your private keys offline. It's the Fort Knox of crypto. While less convenient for daily trading, it is almost impossible for hackers to access remotely. This is where your long-term wealth belongs. Exchange Wallets Are Not Your Keys: When you leave your crypto on an exchange, you are trusting a third party to hold your funds. You don't control the private keys. While exchanges have security protocols, they are still a centralized point of failure. This trader didn't lose to the volatility of $BTC or $ETH. He lost to bad operational security. Your wallet choice is your most critical security decision. Don't be the next victim. So ask yourself: are you holding your crypto safely, or are you serving it on a silver platter for hackers? ā³šŸ”„ #CryptoSecurity #WalletSafety #PhishingScam #CryptoHacks

🚨 A TERRIFYING TRAGEDY: TRADER LIQUIDATED BY HIS OWN WALLET 🚨

call or a failed trade. This is a chilling warning about the most overlooked threat in crypto. A high-volume intraday trader, a "pro" by all accounts, just lost his entire portfolio. The culprit? Not a market crash, but his own wallet choice. šŸ’€
Here's how it went down: he kept his entire portfolio in a hot wallet for quick transfers. Unbeknownst to him, he had clicked a single phishing link earlier. In a matter of seconds, hackers drained his entire balance. Months of profit, gone in a flash—not by the market, but by a simple mistake.
The Hard Lessons You Must Learn šŸ“–
Hot Wallets Are Not for Life Savings: They are fast and convenient because they are always online. This constant connectivity makes them a prime target for hackers. Use them for small, everyday transactions—your "pocket money." Never for your entire portfolio.
Cold Wallets Are Your Vault: A cold wallet, or hardware wallet, is a physical device that stores your private keys offline. It's the Fort Knox of crypto. While less convenient for daily trading, it is almost impossible for hackers to access remotely. This is where your long-term wealth belongs.
Exchange Wallets Are Not Your Keys: When you leave your crypto on an exchange, you are trusting a third party to hold your funds. You don't control the private keys. While exchanges have security protocols, they are still a centralized point of failure.
This trader didn't lose to the volatility of $BTC or $ETH. He lost to bad operational security. Your wallet choice is your most critical security decision. Don't be the next victim.
So ask yourself: are you holding your crypto safely, or are you serving it on a silver platter for hackers? ā³šŸ”„
#CryptoSecurity #WalletSafety #PhishingScam #CryptoHacks
See original
Pyth Network is a very promising and competitive project in the oracle space. Its first-party data model, high-frequency updates, pull model, and other mechanisms bring new efficiency and credibility for real-world data access to the DeFi ecosystem. Although there are still many challenges (security, cost, competition, etc.), if it can continue to operate steadily and expand its ecosystem, its position in financial data infrastructure could become increasingly critical. @ParticleNtwrk #phishingscam $PYTH
Pyth Network is a very promising and competitive project in the oracle space. Its first-party data model, high-frequency updates, pull model, and other mechanisms bring new efficiency and credibility for real-world data access to the DeFi ecosystem. Although there are still many challenges (security, cost, competition, etc.), if it can continue to operate steadily and expand its ecosystem, its position in financial data infrastructure could become increasingly critical. @Particle Network #phishingscam $PYTH
--
Bullish
Till now 2025Ā saw total crypto crime losses exceed $3.1 billion, with phishing scams accounting for $410 million across 132 separate attacks. Now, BlockstreamĀ issuedĀ an urgent security alert warning users regarding sophisticated phishing campaign targeting Jade hardware wallet owners. Kindly protect your wallets. This warning comes as crypto phishing attacks surge dramatically, with Aug losses reaching $12 M, affecting over 15k, a 67% increase from July. #phishingscam
Till now 2025Ā saw total crypto crime losses exceed $3.1 billion, with phishing scams accounting for $410 million across 132 separate attacks. Now, BlockstreamĀ issuedĀ an urgent security alert warning users regarding sophisticated phishing campaign targeting Jade hardware wallet owners.

Kindly protect your wallets. This warning comes as crypto phishing attacks surge dramatically, with Aug losses reaching $12 M, affecting over 15k, a 67% increase from July.

#phishingscam
My 30 Days' PNL
2025-08-16~2025-09-14
+$4,407.13
+213.90%
#phishingscam Crypto investor loses $2.5M in stablecoins in double phishing scam A single victim has been scammed two times within three hours, losing a total of $2.5 million in stablecoins. According to data shared on May 26 by crypto compliance firm Cyvers, the victim sent 843,000 worth of USDt (USDT) followed by another 2.6 million USDt around three hours later. Cyvers said the scam used a method known as a zero-value transfer, a sophisticated form of onchain phishing.
#phishingscam
Crypto investor loses $2.5M in stablecoins in double phishing scam

A single victim has been scammed two times within three hours, losing a total of $2.5 million in stablecoins.

According to data shared on May 26 by crypto compliance firm Cyvers, the victim sent 843,000 worth of USDt (USDT) followed by another 2.6 million USDt around three hours later. Cyvers said the scam used a method known as a zero-value transfer, a sophisticated form of onchain phishing.
#PeckShieldAlert A #phishingscam address labeled "Fake_Phishing442897," which stole $55.4M in #DAI from a whale's account, has swapped 250K $DAI for 102.6 $ETH & transferred them to a new address 0x2751...fC12 The #phishing address currently holds ~$40.5m worth of cryptos, including ~15.18K $ETH, ~2.8M $DAI & ~327.3 $stETH
#PeckShieldAlert
A #phishingscam address labeled "Fake_Phishing442897," which stole $55.4M in #DAI from a whale's account, has swapped 250K $DAI for 102.6 $ETH & transferred them to a new address 0x2751...fC12
The #phishing address currently holds ~$40.5m worth of cryptos, including ~15.18K $ETH , ~2.8M $DAI & ~327.3 $stETH
After laughing at fools that fell for phishing, got phished myself... Twas a good one,i give em that... 2 years, 1k to 46k down the drain, all the bags gone... back at square 1... here we go again ... #phishingscam
After laughing at fools that fell for phishing, got phished myself... Twas a good one,i give em that...

2 years, 1k to 46k down the drain, all the bags gone... back at square 1... here we go again ...

#phishingscam
ā˜„ļø Crypto Phishing Attacks Surge 215% in August: $55M Lost in Single Incident šŸ“£ Cryptocurrency phishing attacks skyrocketed by 215% in August, with total losses exceeding $66 million. A single major attack accounted for $55 million, highlighting the increasing sophistication of scammers. While the number of victims decreased by 34% from July, the stolen amount surged dramatically. šŸ–„ The crypto industry is responding with measures like Binance's "antidote" against address poisoning scams and the launch of the Security Alliance anti-hack response team. These attacks underscore the critical need for heightened security awareness in the crypto space. ā—ļø The surge in phishing attacks calls for extra caution. Always double-check addresses and be wary of suspicious links. Your crypto's safety depends on your awareness! So becareful !!! #scam #phishingscam #becareful #lost #TON
ā˜„ļø Crypto Phishing Attacks Surge 215% in August: $55M Lost in Single Incident

šŸ“£ Cryptocurrency phishing attacks skyrocketed by 215% in August, with total losses exceeding $66 million. A single major attack accounted for $55 million, highlighting the increasing sophistication of scammers. While the number of victims decreased by 34% from July, the stolen amount surged dramatically.

šŸ–„ The crypto industry is responding with measures like Binance's "antidote" against address poisoning scams and the launch of the Security Alliance anti-hack response team. These attacks underscore the critical need for heightened security awareness in the crypto space.

ā—ļø The surge in phishing attacks calls for extra caution. Always double-check addresses and be wary of suspicious links. Your crypto's safety depends on your awareness!

So becareful !!!

#scam #phishingscam #becareful #lost #TON
See original
See original
Inside the most ingenious scams of 2025 (and how not to fall for them)The crypto market has matured: it attracted institutions, gained regulation in different regions of the world, and became professionalized. But in 2025, scammers also evolved. And it's not just beginners who fall for scams: even experienced users are being deceived by increasingly sophisticated frauds. In this article, we show you the most common traps of the moment, how they work, and what you can do to stay safe — especially if you operate from your phone or are active on social media.

Inside the most ingenious scams of 2025 (and how not to fall for them)

The crypto market has matured: it attracted institutions, gained regulation in different regions of the world, and became professionalized. But in 2025, scammers also evolved. And it's not just beginners who fall for scams: even experienced users are being deceived by increasingly sophisticated frauds.
In this article, we show you the most common traps of the moment, how they work, and what you can do to stay safe — especially if you operate from your phone or are active on social media.
šŸŽ£ Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds. Security isn’t just about smart contracts. It’s about not clicking like it’s 2010. #ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
šŸŽ£ Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds.

Security isn’t just about smart contracts. It’s about not clicking like it’s 2010.
#ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
A Man Lost $1.5 Million Instantly — But the Market Had Nothing to Do With ItLosing money in trading is common, but imagine watching $1.5 million vanish in seconds — not because of a bad trade, but due to one critical mistake. That’s exactly what happened to a crypto investor who fell victim to a sophisticated phishing scam. Instead of the market turning against him, it was a fake link that cost him everything. What Went Wrong? The investor connected his wallet to what appeared to be a legitimate decentralized app (dApp). But hidden beneath the surface was malicious code designed to drain the wallet instantly once permissions were granted. Once connected, the scam smart contract took full control — transferring the entire $1.5 million balance to the attacker’s wallet within seconds. The Real Lesson This wasn’t a trading loss — it was a security lapse. The market remained stable, but a lack of caution with wallet permissions and unknown links led to disaster. How to Protect Yourself Always double-check URLs before connecting your wallet. Use hardware wallets for large holdings. Revoke unnecessary token approvals regularly. Stay updated on the latest phishing tactics in crypto. Final Thoughts In crypto, it’s not just the markets you need to watch — it’s your own security habits. One careless click can cost more than any market crash. #PhishingScam #DeFiRisks

A Man Lost $1.5 Million Instantly — But the Market Had Nothing to Do With It

Losing money in trading is common, but imagine watching $1.5 million vanish in seconds — not because of a bad trade, but due to one critical mistake.

That’s exactly what happened to a crypto investor who fell victim to a sophisticated phishing scam. Instead of the market turning against him, it was a fake link that cost him everything.

What Went Wrong?

The investor connected his wallet to what appeared to be a legitimate decentralized app (dApp). But hidden beneath the surface was malicious code designed to drain the wallet instantly once permissions were granted.

Once connected, the scam smart contract took full control — transferring the entire $1.5 million balance to the attacker’s wallet within seconds.

The Real Lesson

This wasn’t a trading loss — it was a security lapse. The market remained stable, but a lack of caution with wallet permissions and unknown links led to disaster.

How to Protect Yourself

Always double-check URLs before connecting your wallet.

Use hardware wallets for large holdings.

Revoke unnecessary token approvals regularly.

Stay updated on the latest phishing tactics in crypto.

Final Thoughts

In crypto, it’s not just the markets you need to watch — it’s your own security habits. One careless click can cost more than any market crash.

#PhishingScam #DeFiRisks
🚨 Breaking News Alert 🚨 āš ļø Fake Ledger Scam Resurfaces — Targeting High-Net-Worth Users! šŸ¤‘šŸ’° According to PANews, the notorious ā€˜Fake Ledger’ scam is BACK! Hackers are šŸ“¦ mailing counterfeit Ledger devices with fake manuals, urging victims to enter their real recovery phrases into a šŸ•µļøā€ā™‚ļø malicious app — leading to šŸ’ø asset theft! This attack, first spotted in 2021, now includes: šŸ” Preset recovery phrases šŸŽ² Tampered RNG chips 🧠 Expert Warning: These physical phishing attacks may seem rare but have a šŸš€ high success rate, especially among šŸ’¼ high-net-worth users. How to Stay Safe: āœ… Never enter your seed phrase into ANY app or website āœ… Buy ONLY from official sources āŒ Don’t trust unsolicited packages — even if it looks ā€œofficialā€ šŸ” Protect your crypto. Stay sharp. Stay safe! #CryptoSecurity #LedgerScam #Web3Alert #PhishingScam #SlowMist $BTC {spot}(BTCUSDT) $ETH {spot}(ETHUSDT) $XRP {spot}(XRPUSDT)
🚨 Breaking News Alert 🚨

āš ļø Fake Ledger Scam Resurfaces — Targeting High-Net-Worth Users! šŸ¤‘šŸ’°

According to PANews, the notorious ā€˜Fake Ledger’ scam is BACK!
Hackers are šŸ“¦ mailing counterfeit Ledger devices with fake manuals, urging victims to enter their real recovery phrases into a šŸ•µļøā€ā™‚ļø malicious app — leading to šŸ’ø asset theft!

This attack, first spotted in 2021, now includes:
šŸ” Preset recovery phrases
šŸŽ² Tampered RNG chips

🧠 Expert Warning: These physical phishing attacks may seem rare but have a šŸš€ high success rate, especially among šŸ’¼ high-net-worth users.

How to Stay Safe:
āœ… Never enter your seed phrase into ANY app or website
āœ… Buy ONLY from official sources
āŒ Don’t trust unsolicited packages — even if it looks ā€œofficialā€

šŸ” Protect your crypto. Stay sharp. Stay safe!

#CryptoSecurity #LedgerScam #Web3Alert #PhishingScam #SlowMist
$BTC
$ETH
$XRP
April 2025 Crypto Phishing Scams Surge: $5.29M Lost Across 7,565 VictimsIn April 2025, ScamSniffer reported that phishing scams led to losses totaling $5.29 million, impacting 7,565 victims. While this represents a 17% decrease in total losses compared to March, the number of victims increased by 26%, indicating a rise in the frequency of attacks. šŸ” Key Attack Vectors: Address Poisoning: The most significant single attack involved address poisoning, resulting in a loss of $1.43 million. This technique involves scammers sending small transactions from addresses that closely resemble those of legitimate contacts, hoping users will inadvertently send funds to the fraudulent address. Permit Exploits: Scammers exploited unrevoked permissions, leading to substantial unauthorized withdrawals. šŸ›”ļø Preventive Measures: 1. Double-Check Addresses: Always verify the recipient's address before initiating a transaction. Be cautious of addresses that appear familiar but may have subtle differences. 2. Revoke Unused Permissions: Regularly review and revoke unnecessary permissions granted to decentralized applications (dApps) to minimize potential vulnerabilities. 3. Use Reputable Security Tools: Employ browser extensions and security tools that can detect and warn against known phishing sites and malicious contracts. 4. Stay Informed: Keep abreast of the latest phishing tactics and scams by following trusted sources and communities within the crypto space. By staying vigilant and adopting these practices, crypto users can better protect their assets against evolving phishing threats. šŸ”’ Recommended Security Tools: Hardware Wallets: Utilizing hardware wallets can provide an added layer of security by keeping your private keys offline. Security Software: Consider using comprehensive security software solutions that offer real-time protection against malware and phishing attempts. Staying informed and implementing robust security measures are crucial steps in safeguarding your cryptocurrency assets against phishing scams. #phishingscam #CryptoScamAlert #scam $STO {spot}(STOUSDT)

April 2025 Crypto Phishing Scams Surge: $5.29M Lost Across 7,565 Victims

In April 2025, ScamSniffer reported that phishing scams led to losses totaling $5.29 million, impacting 7,565 victims. While this represents a 17% decrease in total losses compared to March, the number of victims increased by 26%, indicating a rise in the frequency of attacks.
šŸ” Key Attack Vectors:
Address Poisoning: The most significant single attack involved address poisoning, resulting in a loss of $1.43 million. This technique involves scammers sending small transactions from addresses that closely resemble those of legitimate contacts, hoping users will inadvertently send funds to the fraudulent address. Permit Exploits: Scammers exploited unrevoked permissions, leading to substantial unauthorized withdrawals.
šŸ›”ļø Preventive Measures:
1. Double-Check Addresses: Always verify the recipient's address before initiating a transaction. Be cautious of addresses that appear familiar but may have subtle differences.
2. Revoke Unused Permissions: Regularly review and revoke unnecessary permissions granted to decentralized applications (dApps) to minimize potential vulnerabilities.
3. Use Reputable Security Tools: Employ browser extensions and security tools that can detect and warn against known phishing sites and malicious contracts.
4. Stay Informed: Keep abreast of the latest phishing tactics and scams by following trusted sources and communities within the crypto space.
By staying vigilant and adopting these practices, crypto users can better protect their assets against evolving phishing threats.
šŸ”’ Recommended Security Tools:
Hardware Wallets: Utilizing hardware wallets can provide an added layer of security by keeping your private keys offline. Security Software: Consider using comprehensive security software solutions that offer real-time protection against malware and phishing attempts.
Staying informed and implementing robust security measures are crucial steps in safeguarding your cryptocurrency assets against phishing scams.
#phishingscam #CryptoScamAlert #scam
$STO
🚨 Cybersecurity Warning: Surge in Fake DeepSeek Phishing Websites!$ETH A growing number of fraudulent DeepSeek phishing sites have emerged, now surpassing 2,650. Reports indicate a significant spike in these scams since January 26, posing a serious threat to users. These deceptive platforms are designed to steal login credentials and trick unsuspecting individuals into purchasing virtual assets through counterfeit domains and interfaces.$XRP How These Scams Operate Cybercriminals craft lookalike websites that mimic the official DeepSeek platform, luring users into entering sensitive information. Once credentials are compromised, scammers gain unauthorized access to accounts, leading to potential financial losses. In other cases, users are tricked into making payments for assets that do not exist.$BTC How to Stay Safe šŸ”¹ Always verify website URLs before entering any login details. šŸ”¹ Avoid clicking on suspicious links shared via emails, social media, or unverified sources. šŸ”¹ Enable two-factor authentication (2FA) for an added layer of security. šŸ”¹ Report fraudulent sites to help protect the community. Stay alert and safeguard your assets! šŸ›‘ #OnlineSecurity #PhishingScam #CryptoFraud #AICrashOrComeback #TariffHODL
🚨 Cybersecurity Warning: Surge in Fake DeepSeek Phishing Websites!$ETH

A growing number of fraudulent DeepSeek phishing sites have emerged, now surpassing 2,650. Reports indicate a significant spike in these scams since January 26, posing a serious threat to users. These deceptive platforms are designed to steal login credentials and trick unsuspecting individuals into purchasing virtual assets through counterfeit domains and interfaces.$XRP

How These Scams Operate

Cybercriminals craft lookalike websites that mimic the official DeepSeek platform, luring users into entering sensitive information. Once credentials are compromised, scammers gain unauthorized access to accounts, leading to potential financial losses. In other cases, users are tricked into making payments for assets that do not exist.$BTC

How to Stay Safe

šŸ”¹ Always verify website URLs before entering any login details.
šŸ”¹ Avoid clicking on suspicious links shared via emails, social media, or unverified sources.
šŸ”¹ Enable two-factor authentication (2FA) for an added layer of security.
šŸ”¹ Report fraudulent sites to help protect the community.

Stay alert and safeguard your assets! šŸ›‘ #OnlineSecurity #PhishingScam #CryptoFraud #AICrashOrComeback #TariffHODL
Iris_Reed
--
🚨 PROTECT YOUR BINANCE ACCOUNT NOW! šŸ”
Phishing scams are getting smarter — don’t be their next target.

Here’s how to outsmart them in seconds šŸ‘‡

āø»

šŸ”’ Set Your Anti-Phishing Code (Lifesaver Tip):
It’s a unique code you choose — and Binance includes it in every legit email they send you.

šŸ“Œ Example:
You set your code to ā€œBOB123ā€
āœ… If it’s a REAL Binance email — you’ll see BOB123
āŒ If it’s a SCAM — the code will be missing or wrong

āø»

šŸ› ļø How To Set It Up (Takes 30 seconds):
1ļøāƒ£ Open Binance App
2ļøāƒ£ Go to Security Settings → Anti-Phishing Code
3ļøāƒ£ Create your personal code (keep it private!)
4ļøāƒ£ Done āœ…

āø»

āš ļø Important Reminders:
🚫 NEVER trust emails, links, or SMS without your code
šŸ“± ALWAYS use the official Binance app/website
🧠 Trust your CODE — not your eyes

āø»

šŸ›”ļø Stay smart. Stay secure.
A 10-second setup today could save your entire portfolio tomorrow.

#MyTradingStyle #BinanceAlphaAlert #FOMCMeeting #DAOBaseAIBinanceTGE
See original
CapitƔn inversor
--
I received this message on a social network. What would you do?

Don't fall for scams.

Better invest in #bnb

#phishing
#estafa
#FOMCMeeting
🚨 SCAM ALERT: ā€œCrypto Legacyā€ DM on Twitter! 🚨 Getting DMs like this? šŸ‘‡ šŸ’” "I have cancer... you're the lucky one... take my $6M USDT..." šŸ”— Fake link šŸ” Username & password šŸ’ø Balance: 6,781,231.9891 USDT 😳 🧠 How the Scam Works: 1. Emotional Manipulation The message uses an emotional story (cancer, death, legacy) to lower your guard and make you feel "special" or "chosen." 2. Fake Login Details It includes a fake username, password, and a large, tempting fake crypto balance (e.g., 6781231.9891 USDT). 3. Malicious Link The link (e.g., j.nwebi.com) is designed to: Steal your personal data or credentials. Infect your device with malware. Trick you into logging in so scammers can get your real info or crypto wallet access. ā— It’s 100% a Phishing Scam! They want you to click, log in, and BAM—your data or wallet is GONE. āœ… DO NOT: • Click the link • Enter any info • Trust random emotional stories šŸ›”ļø DO THIS INSTEAD: • Report ā— • Block 🚫 • Warn your friends 🧠 Stay sharp. The only thing these scammers are ā€œleaving behindā€ is regret. #Twitter #cryptoscam #phishingscam #ScamAlert
🚨 SCAM ALERT: ā€œCrypto Legacyā€ DM on Twitter! 🚨

Getting DMs like this? šŸ‘‡
šŸ’” "I have cancer... you're the lucky one... take my $6M USDT..."
šŸ”— Fake link
šŸ” Username & password
šŸ’ø Balance: 6,781,231.9891 USDT 😳

🧠 How the Scam Works:

1. Emotional Manipulation
The message uses an emotional story (cancer, death, legacy) to lower your guard and make you feel "special" or "chosen."

2. Fake Login Details
It includes a fake username, password, and a large, tempting fake crypto balance (e.g., 6781231.9891 USDT).

3. Malicious Link
The link (e.g., j.nwebi.com) is designed to:

Steal your personal data or credentials.

Infect your device with malware.

Trick you into logging in so scammers can get your real info or crypto wallet access.

ā— It’s 100% a Phishing Scam!
They want you to click, log in, and BAM—your data or wallet is GONE.

āœ… DO NOT:
• Click the link
• Enter any info
• Trust random emotional stories

šŸ›”ļø DO THIS INSTEAD:
• Report ā—
• Block 🚫
• Warn your friends 🧠

Stay sharp. The only thing these scammers are ā€œleaving behindā€ is regret.

#Twitter #cryptoscam #phishingscam #ScamAlert
North Korean Kimsuky Exposed by Massive Data LeakIn June 2025, the cybersecurity community was shaken. A member of the notorious North Korean hacking group Kimsuky APT became the victim of a massive data breach, revealing hundreds of gigabytes of sensitive internal files, tools, and operational details. According to security experts from Slow Mist, the leaked data included browser histories, detailed phishing campaign logs, manuals for custom backdoors and attack systems such as the TomCat kernel backdoor, modified Cobalt Strike beacons, the Ivanti RootRot exploit, and Android malware like Toybox. Two Compromised Systems and Hacker ā€œKIMā€ The breach was linked to two compromised systems operated by an individual known as ā€œKIMā€ – one was a Linux developer workstation (Deepin 20.9), the other a publicly accessible VPS server. The Linux system was likely used for malware development, while the VPS hosted phishing materials, fake login portals, and command-and-control (C2) infrastructure. The leak was carried out by hackers identifying themselves as ā€œSaberā€ and ā€œcyb0rgā€, who claimed to have stolen and published the contents of both systems. While some evidence ties ā€œKIMā€ to known Kimsuky infrastructure, linguistic and technical indicators also suggest a possible Chinese connection, leaving the true origin uncertain. A Long History of Cyber Espionage Kimsuky has been active since at least 2012 and is linked to the Reconnaissance General Bureau, North Korea’s primary intelligence agency. It has long specialized in cyber espionage targeting governments, think tanks, defense contractors, and academia. In 2025, its campaigns – such as DEEP#DRIVE – relied on multi-stage attack chains. They typically began with ZIP archives containing LNK shortcut files disguised as documents, which, when opened, executed PowerShell commands to download malicious payloads from cloud services like Dropbox, using decoy documents to appear legitimate. Advanced Techniques and Tools In spring 2025, Kimsuky deployed a mix of VBScript and PowerShell hidden inside ZIP archives to: Log keystrokesSteal clipboard dataHarvest cryptocurrency wallet keys from browsers (Chrome, Edge, Firefox, Naver Whale) Attackers also paired malicious LNK files with VBScripts that executed mshta.exe to load DLL-based malware directly into memory. They used custom RDP Wrapper modules and proxy malware to enable covert remote access. Programs like forceCopy extracted credentials from browser configuration files without triggering standard password access alerts. Exploiting Trusted Platforms Kimsuky abused popular cloud and code-hosting platforms. In a June 2025 spear phishing campaign targeting South Korea, private GitHub repositories were used to store malware and stolen data. By delivering malware and exfiltrating files via Dropbox and GitHub, the group was able to hide its activity within legitimate network traffic. #NorthKoreaHackers , #cyberattacks , #CyberSecurity , #phishingscam , #worldnews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

North Korean Kimsuky Exposed by Massive Data Leak

In June 2025, the cybersecurity community was shaken. A member of the notorious North Korean hacking group Kimsuky APT became the victim of a massive data breach, revealing hundreds of gigabytes of sensitive internal files, tools, and operational details.
According to security experts from Slow Mist, the leaked data included browser histories, detailed phishing campaign logs, manuals for custom backdoors and attack systems such as the TomCat kernel backdoor, modified Cobalt Strike beacons, the Ivanti RootRot exploit, and Android malware like Toybox.

Two Compromised Systems and Hacker ā€œKIMā€
The breach was linked to two compromised systems operated by an individual known as ā€œKIMā€ – one was a Linux developer workstation (Deepin 20.9), the other a publicly accessible VPS server.

The Linux system was likely used for malware development, while the VPS hosted phishing materials, fake login portals, and command-and-control (C2) infrastructure.
The leak was carried out by hackers identifying themselves as ā€œSaberā€ and ā€œcyb0rgā€, who claimed to have stolen and published the contents of both systems. While some evidence ties ā€œKIMā€ to known Kimsuky infrastructure, linguistic and technical indicators also suggest a possible Chinese connection, leaving the true origin uncertain.

A Long History of Cyber Espionage
Kimsuky has been active since at least 2012 and is linked to the Reconnaissance General Bureau, North Korea’s primary intelligence agency. It has long specialized in cyber espionage targeting governments, think tanks, defense contractors, and academia.
In 2025, its campaigns – such as DEEP#DRIVE – relied on multi-stage attack chains. They typically began with ZIP archives containing LNK shortcut files disguised as documents, which, when opened, executed PowerShell commands to download malicious payloads from cloud services like Dropbox, using decoy documents to appear legitimate.

Advanced Techniques and Tools
In spring 2025, Kimsuky deployed a mix of VBScript and PowerShell hidden inside ZIP archives to:
Log keystrokesSteal clipboard dataHarvest cryptocurrency wallet keys from browsers (Chrome, Edge, Firefox, Naver Whale)
Attackers also paired malicious LNK files with VBScripts that executed mshta.exe to load DLL-based malware directly into memory. They used custom RDP Wrapper modules and proxy malware to enable covert remote access.
Programs like forceCopy extracted credentials from browser configuration files without triggering standard password access alerts.

Exploiting Trusted Platforms
Kimsuky abused popular cloud and code-hosting platforms. In a June 2025 spear phishing campaign targeting South Korea, private GitHub repositories were used to store malware and stolen data.

By delivering malware and exfiltrating files via Dropbox and GitHub, the group was able to hide its activity within legitimate network traffic.

#NorthKoreaHackers , #cyberattacks , #CyberSecurity , #phishingscam , #worldnews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
The $2 Million Phishing Scam: A Cautionary TaleA cryptocurrency investor fell prey to a sophisticated phishing scheme, losing $2 million worth of Ethereum (501 ETH). The attacker exploited the "IncreaseAllowance" function, gaining unauthorized access to the victim's funds. The Incident: The investor received a seemingly legitimate email or message that tricked them into authorizing the malicious transaction. The attacker swiftly drained the funds, leaving the victim with significant financial losses. Key Takeaways: - Phishing schemes can be highly sophisticated - Verify authenticity before taking action - Robust security measures are crucial to protect digital assets Stay Safe: - Be cautious of suspicious emails or messages - Verify legitimacy before interacting with transactions - Implement strong security protocols #phishingscam #Ethereum #Cryptocurrency #Security #Cybercrime $ETH {spot}(ETHUSDT)

The $2 Million Phishing Scam: A Cautionary Tale

A cryptocurrency investor fell prey to a sophisticated phishing scheme, losing $2 million worth of Ethereum (501 ETH). The attacker exploited the "IncreaseAllowance" function, gaining unauthorized access to the victim's funds.
The Incident:
The investor received a seemingly legitimate email or message that tricked them into authorizing the malicious transaction. The attacker swiftly drained the funds, leaving the victim with significant financial losses.
Key Takeaways:
- Phishing schemes can be highly sophisticated
- Verify authenticity before taking action
- Robust security measures are crucial to protect digital assets
Stay Safe:
- Be cautious of suspicious emails or messages
- Verify legitimacy before interacting with transactions
- Implement strong security protocols
#phishingscam #Ethereum #Cryptocurrency #Security #Cybercrime $ETH
Login to explore more contents
Explore the latest crypto news
āš”ļø Be a part of the latests discussions in crypto
šŸ’¬ Interact with your favorite creators
šŸ‘ Enjoy content that interests you
Email / Phone number